Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Presentaciones (3)
- Regulation (3)
- Artículos (2)
- Bruno (2)
- Costantini (2)
-
- Derecho (2)
- FTC (2)
- Behavioral Advertisement Regulation (1)
- Behavioral Advertising (1)
- Cable (1)
- Christianity (1)
- Civil rights (1)
- Consumer Interests (1)
- Consumers (1)
- Contribuciones (1)
- Contribuyentes (1)
- Cookies (1)
- Copyright (1)
- Copyright Act (1)
- Corporations (1)
- Critical race theory (1)
- DMCA (1)
- DPI (1)
- DRM (1)
- Data Breach Notification (1)
- Datos personales (1)
- Deep Packet Inspection Technology (1)
- Delito fiscal (1)
- Delitos (1)
- Derecho de la Seguridad Social en México (1)
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Consumer Protection Law
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
University of Michigan Journal of Law Reform
This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …
Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García
Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García
Bruno L. Costantini García
De origen, difundir los diversos esquemas permitidos por la Ley para posibilitar la realización de proyectos con fines inmobiliarios, a efecto de que los núcleos agrarios y sus integrantes se beneficien equitativamente de la urbanización de sus tierras, coadyuvando con ello al desarrollo urbano planificado y ordenado de los centros de población del Estado de Puebla; como consecuencia, impulsar el desarrollo habitacional equilibrado de éste. Eliminar el circulo.- “necesidad de tierra – asentamiento irregular – solución de conflicto”, mediante la planeación socioeconómico de los núcleos agrarios ejidales y comunales, a fin de diseñar un mecanismo eficaz que satisfaga las necesidades …
Llm Cyberlaw: Information Technology, Law And Society, Subhajit Basu
Llm Cyberlaw: Information Technology, Law And Society, Subhajit Basu
Subhajit Basu
LLM in Cyberlaw: information technology, law and society enables you to develop knowledge and skills in relation to the legal rules regulating cyberlaw activity in the UK and Europe, and at a global level.
Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq.
Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq.
Rodolfo C. Rivas
The author discusses the subtle differences between Copyright and Author's Rights. Then he goes into analyzing the different ways a work can become part of the public domain and how it varies from jurisdiction to jurisdiction and from time to time.////////////////////////////////////////////////////El autor analiza las sutiles diferencias entre los derechos de autor y el copyright. Posteriormente se adentra en el análisis de las formas en las que una obra entra dentro del dominio público, y como estas varían dependiendo del territorio y de la época.
Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García
Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García
Bruno L. Costantini García
Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.
Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.
La Globalización De La Legislación Cambiaria, Bruno L. Costantini García
La Globalización De La Legislación Cambiaria, Bruno L. Costantini García
Bruno L. Costantini García
No abstract provided.
New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas
New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas
Panagiotis Kitsos
On 25 November 2009, the European Parliament and Council adopted a new legislation to revise the regulatory framework for the electronic communications sector. This new “package” of Directives includes Directive 2009/136/EC, which amends earlier Directive 2002/58/EC in the fields of 1. mandatory notification of personal data security breaches 2. consent requirements for cookies and 3. anti-spamming measures by ISPs. The scope of the Directive is to enhance the protection of consumers privacy and personal data in the electronic communications sector, through strengthened security-related provisions and improved enforcement mechanisms by the NRAs. In particular Τhe provisions of the new directive require …
Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez
Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez
Bruno L. Costantini García
Introducción a la regulación de la protección de datos personales en México.
Behavioral Advertisement Regulation: How The Negative Perception Of Deep Packet Inspection Technology May Be Limiting The Online Experience, Andrea N. Person
Behavioral Advertisement Regulation: How The Negative Perception Of Deep Packet Inspection Technology May Be Limiting The Online Experience, Andrea N. Person
Federal Communications Law Journal
Privacy concerns associated with information available on the Internet has become a central focus for policymakers in Washington, D.C., and around the world. Specifically, the use of deep packet inspection (DPI) technology to offer behavioral advertising on the Internet has become the focus of policy discussions. While there are legitimate concerns related to improper use of this technology, the benefits of the proper use of DPI should not be overlooked. This Note asks how increasing regulatory barriers to limit online behavioral advertising could affect the consumer's experience online. To answer this question, this Note first looks at what DPI is, …
Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth
Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth
Federal Communications Law Journal
In a remarkably short time, Google, Inc. has grown from two people working in a rented garage to a pervasive Internet force. Much of Google's unprecedented success stems from online advertising sales which employ behavioral advertising techniques-techniques that track consumer behavior--thereby increasing relevance and decreasing the cost of reaching a targeted audience. In the same span that saw Google's inception and explosive online dominance, the Federal Trade Commission has struggled to define not only the privacy issues involved in online behavioral advertising, but also the practice of behavioral advertising itself. Freed from the restraints of comprehensive federal laws and restrictive …
Derecho De La Seguridad Social En México, Bruno L. Costantini García
Derecho De La Seguridad Social En México, Bruno L. Costantini García
Bruno L. Costantini García
Breve presentación del Derecho de la Segurida Social en México.
¿Qué es?
¿Cómo funciona?
¿Su aplicación?
Protecting Consumers From Spyware: A Proposed Consumer Digital Trespass Act, 28 J. Marshall J. Computer & Info. L. 185 (2010), Richard G. Kunkel
Protecting Consumers From Spyware: A Proposed Consumer Digital Trespass Act, 28 J. Marshall J. Computer & Info. L. 185 (2010), Richard G. Kunkel
UIC John Marshall Journal of Information Technology & Privacy Law
“Spyware” is a broad term used to describe software that resides on a user’s computer and monitors the user’s online behavior. Though spyware may be helpful or benign, it can also be used for malicious purposes, commonly classified as “malware”. Consumers, who lack sophistication to avoid unintentionally downloading spyware, are especially vulnerable to the threat of malware. In lieu of this threat, it is important to understand the nature and scope of spyware problems affecting consumers. The paper will discuss how common law tort theories of trespass and trespass to chattel are difficult to apply to spyware, and how a …
Safeguarding "The Precious": Counsel On Law Journal Publication Agreements In Digital Times, 28 J. Marshall J. Computer & Info. L. 217 (2010), Michael N. Widener
Safeguarding "The Precious": Counsel On Law Journal Publication Agreements In Digital Times, 28 J. Marshall J. Computer & Info. L. 217 (2010), Michael N. Widener
UIC John Marshall Journal of Information Technology & Privacy Law
Heaping scholarship fills the academic print and online press about where legal scholars should publish and how to have one’s paper accepted for publication. But there is scarce writing about the contractual relationship between the law journal and the author of an accepted paper. This may be due in part to broadly misconstrued or ignored publication agrees, or perhaps that the business relationship is unworthy of scholarly attention. Regardless, this paper introduces a pragmatist’s perspective on evaluating and revising publication agreements, and informs student editors how publication agreements accomplish a journal’s objectives, based on current copyright law. Finally, this paper …
Advancing Consumer Interests Through Ubiquitous Broadband: The Need For A New Spectrum, Meredith Attwell Baker
Advancing Consumer Interests Through Ubiquitous Broadband: The Need For A New Spectrum, Meredith Attwell Baker
Federal Communications Law Journal
Comprehensive and long-term spectrum reform can play a critical role in the FCC's development of a National Broadband Plan and in its consideration of Open Internet rules. More efficient and intensive use of the nation's spectrum resources would help provide a path to greater broadband deployment, competition and innovation for all consumers. Wireless and mobile technologies hold great promise to offer consumers new services to complement, extend, or even replace existing broadband offerings. A comprehensive review of the nation's spectrum policy is, therefore, necessary to ensure that wireless and mobile broadband services are not hamstrung by outdated rules or command-and-control …
Privacy As Product Safety, James Grimmelmann
Privacy As Product Safety, James Grimmelmann
Cornell Law Faculty Publications
Online social media confound many of our familiar expectations about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.
Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …
Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton
Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton
Articles
While digital video and multi-media technologies are becoming increasingly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringements of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware of the existence of the records, they may be unaware of potential legal remedies, or unable to afford legal recourse. This paper concentrates on the ability of individuals to obtain legal redress for unauthorized use of audio, video and multi-media content that infringes their …
Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser
Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser
Publications
For centuries, the fair use doctrine has been the main--if not the exclusive--bastion of user rights. Originating in the English courts of equity, the doctrine permitted users, under appropriate circumstances, to employ copyrighted content without the rightsholder's consent. In the current digital media environment, however, the uncertainty that shrouds fair use and the proliferation of technological protection measures undermine the doctrine and its role in copyright policy. Notably, the enactment of the Digital Millennium Copyright Act, which prohibits the circumvention of technological protection measures even for fair use purposes, has diminished the ability of fair use to counterbalance a copyright …